mirror of
https://github.com/linuxkit/linuxkit.git
synced 2025-07-19 09:16:29 +00:00
pkg/sysctl: Prevent ebpf privilege escalation
On 4.9.x and 4.14.x kernels ebpf verifier bugs allow ebpf programs to access (read/write) random memory. Setting kernel.unprivileged_bpf_disabled=1 mitigates this somewhat until it is fixed upstream. See: - https://lwn.net/Articles/742170 - https://lwn.net/Articles/742169 Signed-off-by: Rolf Neugebauer <rolf.neugebauer@docker.com>
This commit is contained in:
parent
a7e7a39f89
commit
720fb219ce
@ -26,3 +26,6 @@ kernel.dmesg_restrict = 1
|
||||
kernel.perf_event_paranoid = 3
|
||||
fs.protected_hardlinks = 1
|
||||
fs.protected_symlinks = 1
|
||||
# Prevent ebpf privilege escalation
|
||||
# see: https://lwn.net/Articles/742170
|
||||
kernel.unprivileged_bpf_disabled=1
|
||||
|
Loading…
Reference in New Issue
Block a user